Sciweavers

17680 search results - page 188 / 3536
» Simulation of Computer Systems and Applications
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 4 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
129
Voted
EUROMICRO
1999
IEEE
15 years 7 months ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
ICDM
2003
IEEE
135views Data Mining» more  ICDM 2003»
15 years 8 months ago
An Algorithm for the Exact Computation of the Centroid of Higher Dimensional Polyhedra and its Application to Kernel Machines
The Support Vector Machine (SVM) solution corresponds to the centre of the largest sphere inscribed in version space. Alternative approaches like Bayesian Point Machines (BPM) and...
Frédéric Maire
ITNG
2006
IEEE
15 years 9 months ago
Evaluating Parallel Computing Systems in Bioinformatics
The utilization of parallel processing in bioinformatics is a relatively new development, and wide spread use of parallel processing in this domain has been limited by the availab...
Erik S. Gough, Michael D. Kane
EGC
2005
Springer
15 years 9 months ago
High Throughput Computing for Spatial Information Processing (HIT-SIP) System on Grid Platform
For many remote sensing application projects, the quality of the research or the product is heavily dependent upon the quantity of computing cycles available. Middleware is softwar...
Yong Xue, Yanguang Wang, Jianqin Wang, Ying Luo, Y...